Struct aws_sdk_wafv2::types::AwsManagedRulesAtpRuleSet
source · #[non_exhaustive]pub struct AwsManagedRulesAtpRuleSet {
pub login_path: Option<String>,
pub request_inspection: Option<RequestInspection>,
pub response_inspection: Option<ResponseInspection>,
pub enable_regex_in_path: bool,
}Expand description
Details for your use of the account takeover prevention managed rule group, AWSManagedRulesATPRuleSet. This configuration is used in ManagedRuleGroupConfig.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.login_path: Option<String>The path of the login endpoint for your application. For example, for the URL https://example.com/web/login, you would provide the path /web/login.
The rule group inspects only HTTP POST requests to your specified login endpoint.
request_inspection: Option<RequestInspection>The criteria for inspecting login requests, used by the ATP rule group to validate credentials usage.
response_inspection: Option<ResponseInspection>The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates.
Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.
The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts for each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many failed login attempts in a short amount of time.
enable_regex_in_path: boolAllow the use of regular expressions in the login page path.
Implementations§
source§impl AwsManagedRulesAtpRuleSet
impl AwsManagedRulesAtpRuleSet
sourcepub fn login_path(&self) -> Option<&str>
pub fn login_path(&self) -> Option<&str>
The path of the login endpoint for your application. For example, for the URL https://example.com/web/login, you would provide the path /web/login.
The rule group inspects only HTTP POST requests to your specified login endpoint.
sourcepub fn request_inspection(&self) -> Option<&RequestInspection>
pub fn request_inspection(&self) -> Option<&RequestInspection>
The criteria for inspecting login requests, used by the ATP rule group to validate credentials usage.
sourcepub fn response_inspection(&self) -> Option<&ResponseInspection>
pub fn response_inspection(&self) -> Option<&ResponseInspection>
The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates.
Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.
The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts for each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many failed login attempts in a short amount of time.
sourcepub fn enable_regex_in_path(&self) -> bool
pub fn enable_regex_in_path(&self) -> bool
Allow the use of regular expressions in the login page path.
source§impl AwsManagedRulesAtpRuleSet
impl AwsManagedRulesAtpRuleSet
sourcepub fn builder() -> AwsManagedRulesAtpRuleSetBuilder
pub fn builder() -> AwsManagedRulesAtpRuleSetBuilder
Creates a new builder-style object to manufacture AwsManagedRulesAtpRuleSet.
Trait Implementations§
source§impl Clone for AwsManagedRulesAtpRuleSet
impl Clone for AwsManagedRulesAtpRuleSet
source§fn clone(&self) -> AwsManagedRulesAtpRuleSet
fn clone(&self) -> AwsManagedRulesAtpRuleSet
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moresource§impl Debug for AwsManagedRulesAtpRuleSet
impl Debug for AwsManagedRulesAtpRuleSet
source§impl PartialEq<AwsManagedRulesAtpRuleSet> for AwsManagedRulesAtpRuleSet
impl PartialEq<AwsManagedRulesAtpRuleSet> for AwsManagedRulesAtpRuleSet
source§fn eq(&self, other: &AwsManagedRulesAtpRuleSet) -> bool
fn eq(&self, other: &AwsManagedRulesAtpRuleSet) -> bool
self and other values to be equal, and is used
by ==.